ETSI TS V1.1.1 ( )

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "ETSI TS 102 280 V1.1.1 (2004-03)"

Transcription

1 TS V1.1.1 ( ) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons

2 2 TS V1.1.1 ( ) Reference DTS/ESI Keywords electronic signature, IP, profile, security 650 Route des Lucioles F Sophia Antipolis Cedex - FRANCE Tel.: Fax: Siret N NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on printers of the PDF version kept on a specific network drive within Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other documents is available at If you find errors in the present document, send your comment to: Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute All rights reserved. DECT TM, PLUGTESTS TM and UMTS TM are Trade Marks of registered for the benefit of its Members. TIPHON TM and the TIPHON logo are Trade Marks currently being registered by for the benefit of its Members. 3GPP TM is a Trade Mark of registered for the benefit of its Members and of the 3GPP Organizational Partners.

3 3 TS V1.1.1 ( ) Contents Intellectual Property Rights...5 Foreword...5 Introduction Scope References Abbreviations Document structure and terminology Document structure Terminology Profile requirements Generic requirements Basic certificate fields Version Serial number Signature Issuer Validity Subject Subject public key info X.509 version 2 certificate fields Standard certificate extensions Authority key identifier Subject key identifier Key usage Private key usage period Certificate policies Policy mappings Subject alternative name Issuer alternative name Subject directory attributes Basic constraints Name constraints Policy constraints Extended key usage CRL distribution points Inhibit any-policy Freshest CRL RFC 3280 internet certificate extensions Authority Information Access Subject information access RFC 3739 certificate extensions Biometric information Qualified certificate statement...12 Annex A (informative): Important requirements from referenced s...13 A.1 Scope and structure...13 A.2 Basic certificate fields...13 A.2.1 Version...13 A.2.2 Serial number...13 A.2.3 Signature...13 A.2.4 Issuer...13 A.2.5 Validity...14

4 4 TS V1.1.1 ( ) A.2.6 A.2.7 Subject...14 Subject public key info...14 A.3 X.509 version 2 certificate fields...14 A.4 Standard certificate extensions...14 A.4.1 Authority key identifier...14 A.4.2 Subject key identifier...15 A.4.3 KeyUsage...15 A.4.4 Private key usage period...15 A.4.5 Certificate policies...15 A.4.6 Policy mappings...15 A.4.7 Subject alternative name...16 A.4.8 Issuer alternative name...16 A.4.9 Subject directory attributes...16 A.4.10 Basic constraints...16 A.4.11 Name constraints...16 A.4.12 Policy constraints...16 A.4.13 Extended key usage...16 A.4.14 CRL distribution points...16 A.4.15 Inhibit any-policy...17 A.4.16 Freshest CRL...17 A.5 RFC 3280 internet certificate extensions...17 A.5.1 Authority information access...17 A.5.2 Subject information access...17 A.6 RFC 3739 certificate extensions...17 A.6.1 Biometric information...17 A.6.2 Qualified certificate statement...18 History...19

5 5 TS V1.1.1 ( ) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to. The information pertaining to these essential IPRs, if any, is publicly available for members and non-members, and can be found in SR : "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to in respect of s", which is available from the Secretariat. Latest updates are available on the Web server ( Pursuant to the IPR Policy, no investigation, including IPR searches, has been carried out by. No guarantee can be given as to the existence of other IPRs not referenced in SR (or the updates on the Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by Technical Committee Electronic Signatures and Infrastructures (ESI). Introduction The present document defines a common profile for X.509 based certificates issued to natural persons. The Directive of the European Parliament and of the Council on a Community framework for electronic signatures (1999/93/EC [1]) defines requirements on a specific type of certificates named "Qualified Certificates". Implementation of the Directive 1999/93/EC [1] and deployment of certificate infrastructures throughout Europe as well as in countries outside of Europe, have resulted in a variety of certificate implementations for use in public and closed environments, where some are declared as Qualified Certificates while others are not. Applications need support from ized identity certificates profiles, in particular when applications are used for electronic signatures, authentication and secure electronic exchange in open environments and international trust scenarios, but also when certificates are used in local application contexts.

6 6 TS V1.1.1 ( ) 1 Scope The present document defines a common profile for ITU-T Recommendation X.509 [2] based certificates issued to natural persons. The scope of the present document is to provide a certificate profile, which will allow actual interoperability of certificates issued for the purposes of qualified electronic signatures, peer entity authentication and data authentication. This profile depends on the Internet s RFC 3280 [3] and RFC 3739 [4] for generic profiling of ITU-T Recommendation X.509 [2], and depends on the TS [5] to define implementation of requirements defined by the Electronic Signature Directive 1999/93/EC [1] Annexes I and II. The scope of the present document is primary limited to facilitate interoperable processing and display of certificate information in existing deployments of ITU-T Recommendation X.509 [2]. It is thus important to note that this profile deliberately has excluded support for some certificate information content options, which may be perfectly valid in a local context but which are not regarded as relevant or suitable for use in widely deployed applications. The present document focuses on requirements on certificate content. Requirements on decoding and processing rules are limited to aspects required to process certificate content defined in the present document. Further processing requirements are only specified for cases where it adds information that is necessary for the sake of interoperability. Guidance for implementers is provided for cases in which near term developments are affected. This certificate profile recognizes the natural need for reasonable variations of implementation which does not negatively affect generic interoperability. This is e.g. valid for different ways to encode a certificate holder's identity. Certain applications or protocols impose specific requirements on certificate content such as IP-sec, Network logon, S/MIME, IEEE 802.1x [12] EAP. The present document is based on the assumption that these requirements are adequately defined by the respective application or protocol. It is therefore outside the scope of the present document to specify such application or protocol specific certificate content. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. documents which are not found to be publicly available in the expected location might be found at [1] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. [2] ITU-T Recommendation X.509/ISO/IEC : "Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks". [3] IETF RFC 3280: "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile". [4] IETF RFC 3739: "Internet X.509 Public Key Infrastructure: Qualified Certificates Profile". [5] TS : "Qualified Certificate profile". [6] IETF RFC 2119: "Key words for use in RFCs to Indicate Requirement Levels". [7] IETF RFC 3279: "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile".

7 7 TS V1.1.1 ( ) [8] SR : "Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures". [9] IETF RFC 2616: "Hypertext Transfer Protocol - HTTP/1.1". [10] IETF RFC 2255: "The LDAP URL Format". [11] IETF RFC 2560: "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP". [12] IEEE 802.1x: "IEEE Standard for Port Based Network Access Control". [13] RFC 2459: "Internet X.509 Public Key Infrastructure Certificate and CRL Profile". 3 Abbreviations For the purposes of the present document, the following abbreviations apply: CA CRL DS KEA NR OCSP OID Certification Authority Certificate Revocation List Digital Signature Key Encipherment or Agreement Non-Repudiation Online Certificate Status Protocol Object Identifier 4 Document structure and terminology 4.1 Document structure The present document profiles the use of other s. Clause 4 contains the profiling requirements defined by the present document. This clause does not repeat the base requirements of the referenced s. Annex A is an informative annex which, for convenience purposes only, lists some important requirements from referenced s that are relevant for the understanding of the present document. 4.2 Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in the present document are to be interpreted as described in RFC 2119 [6]. 5 Profile requirements 5.1 Generic requirements All certificate fields and extensions SHALL, where applicable, comply with RFC 3280 [3], RFC 3739 [4] and TS [5] with the amendments specified in the present document. When "No specific requirements" is stated for a particular field or extension, this means that no specific requirements apply except for those stated by RFC 3280 [3], RFC 3739 [4] and TS [5]. In case of discrepancies between the present specification and the named s above, the present document is the normative one.

8 8 TS V1.1.1 ( ) 5.2 Basic certificate fields Version Certificates compliant with the present document SHALL be ITU-T Recommendation X.509 [2] version 3 certificates Serial number No specific requirements Signature Signature algorithm SHALL be specified according to RFC 3279 [7] and SR [8]. It is strongly RECOMMENDED to use sha1withrsaencryption when maximum interoperability with open environment deployments is a requirement Issuer The identity of the issuer SHALL be specified using an appropriate subset of the following attributes: countryname, organizationname, organizationalunitname, (multiple instances may be present) stateorprovincename, localityname, commonname, serialnumber, and domaincomponent. Additional attributes MAY be present but they SHOULD NOT be necessary to identify the issuing organization. The attributes countryname and organizationname SHALL be present. The organizationname attribute SHALL contain the full registered name of the certificate issuing organization and countryname SHALL contain the country within which the issuing organization is registered. If any value of the domaincomponent attributes contain information associated with a country, then this has no meaning beyond describing the issuer's internet domain. If a domaincomponent attribute value indicates a different country than the countryname attribute value, then determination of the country of registration of the issuing organization SHALL exclusively be determined though the countryname attribute, disregarding any domaincomponent attribute values. NOTE: Use of domaincomponent attributes in addition to the mandatory attributes countryname and organizationname is possible but it may cause conflict if the issuer name is used as distinguished name for directory entries. Implementing CAs should carefully select their issuing name in compliance with any directory infrastructure they operate within Validity No specific requirements Subject The subject field SHALL contain an appropriate subset of the following attributes: domaincomponent, countryname, commonname, surname, givenname, serialnumber, title,

9 9 TS V1.1.1 ( ) organizationname, organizationalunitname, stateorprovincename, and localityname. Other attributes may be present but SHALL NOT be necessary to distinguish the subject name from other subject names within the issuer domain. The subject field SHALL include at least one of the following choice of attributes: Choice I: commonname Choice II: givenname and surname NOTE: The use of domaincomponent attributes is often used as alternative to the subject attributes countryname and organizationname. Use of domaincomponent attributes in addition to these attributes is not invalid but may cause conflict if the subject name is used as distinguished name for directory entries. Implementing CAs should carefully select their subject naming in compliance with any directory infrastructure they operate within Subject public key info The subject public key SHALL be included according to RFC 3279 [7] and SR [8]. It is strongly RECOMMENDED to use rsaencryption when maximum interoperability with open environment deployments is a requirement. 5.3 X.509 version 2 certificate fields The ITU-T Recommendation X.509 [2] version 2 certificate fields Issuer and Subject Unique Identifier SHALL NOT be present. 5.4 Standard certificate extensions Authority key identifier The authority key identifier extension SHALL be present, containing a key identifier for the issuing CA's public key Subject key identifier No specific requirements Key usage The following key usage settings are named in this profile as type A, B, C, D and E: Type Non-Repudiation [NR] (Bit 1) Digital Signature [DS] (Bit 0) Key Encipherment or Agreement [KEA] (Bit 2 or 4) A X B X X C X D X X E X In cases where a certificate is intended to be used to validate commitment to signed content, such as electronic signatures on agreements and/or transactions, then the key usage combination SHALL be limited to type A or B. This means that the non-repudiation bit (bit 1) SHALL be set. Of these alternatives it is RECOMMENDED to use the type A setting only (see the security note below).

10 10 TS V1.1.1 ( ) For all other certificates compliant with this profile, key usage settings SHALL be limited to type C, D or E. If the certificate is declared to be a Qualified Certificate according to TS [5] then the key usage setting SHALL be limited to type A, B or C. NOTE: Choice of bit 2 or bit 4 for expressing [KEA] is dependent on the algorithm type specified in subject public key info (clause Subject public key info). Appropriate values for RSA keys are referenced in clause A.4.3. Security note: Combining the non-repudiation bit (bit 1) in the keyusage certificate extension with other keyusage bits may have security implications depending on the security environment in which the certificate is to be used. If the subject's environment can be fully controlled and trusted, then there are no specific security implications. For example, in cases where the subject is fully confident about exactly which data is signed or cases where the subject is fully confident about the security characteristics of the authentication protocol being used. If the subject's environment is not fully controlled or not fully trusted, then unintentional signing of commitments is possible. Examples include the use of badly formed authentication exchanges and the use of a rogue software component. If untrusted environments are used by a subject, these security implications can be limited through use of the following measures: - to not combine non-repudiation key usage setting in certificates with any other key usage setting and to use the corresponding private key only with this certificate; - to limit the use of private keys associated with certificates that have the non-repudiation key usage bit set, to environments which are considered adequately controlled and trustworthy Private key usage period No specific requirements Certificate policies This extension SHOULD NOT be marked critical Policy mappings This extension is not applicable to end entity certificates addressed by the present document Subject alternative name This extension SHALL NOT be marked critical Issuer alternative name This extension SHALL NOT be marked critical Subject directory attributes The subject directory attributes extension, if present, SHALL NOT be used to store any of the identification attribute listed in clause Basic constraints No specific requirements.

11 11 TS V1.1.1 ( ) Name constraints This extension is not applicable to end entity certificates addressed by the present document Policy constraints This extension is not applicable to end entity certificates addressed by the present document Extended key usage This extension SHALL NOT be marked critical CRL distribution points The CRL distribution point extension SHALL be present. At least one reference to a publicly available CRL SHALL be present. At least one of the present references SHALL use either http ( RFC 2616 [9] or ldap (ldap://) RFC 2255 [10] scheme. The extension SHALL NOT be marked critical. Compliant issuing CAs MAY support other certificate status checking services, such as OCSP, in addition to support of CRL through this extension Inhibit any-policy This extension is not applicable to end entity certificates addressed by the present document Freshest CRL No specific requirements. 5.5 RFC 3280 internet certificate extensions Authority Information Access The Authority Information Access extension SHOULD include an accessmethod OID, id-ad-caissuers, with an accesslocation value specifying at least one access location of a valid CA certificate of the issuing CA. At least one access location SHOULD use the either http ( RFC 2616 [9] scheme. This recommendation MAY be ignored altogether when the issuing CA is represented by a self signed root certificate Subject information access No specific requirements. 5.6 RFC 3739 certificate extensions Biometric information No specific requirements.

12 12 TS V1.1.1 ( ) Qualified certificate statement Certificates declared as Qualified Certificates SHALL comply with TS [5] regarding use of this extension.

13 13 TS V1.1.1 ( ) Annex A (informative): Important requirements from referenced s A.1 Scope and structure Annex A lists important requirements and recommendations from referenced s which are considered important for implementation of the present document. Annex A is included for convenience in order to facilitate a better understanding of the requirements of the present document in situations where the reader does not have all referenced s available or in situations where the reader wishes to obtain a brief understanding of the present document without having to review the complex set of referenced s. All referenced s in annex A are listed in clause 2 of the present document. The list of requirements and recommendations is not exhaustive. The referenced s are necessary to obtain full understanding of listed requirements and recommendations. A.2 Basic certificate fields A.2.1 Version No specific requirement listed. A.2.2 Serial number RFC 3280 [3] Serial number of the certificate SHALL be a positive (non-negative) integer. Serial number SHALL NOT be longer than 20 octets. A.2.3 Signature RFC 3279 [7] sha-1withrsaencryption OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 5 } A.2.4 Issuer RFC 3280 [3] All certificates issued after December 31, 2003 SHALL use the UTF8String encoding of DirectoryString. RFC 3739 [4] The issuer field SHALL identify the organization responsible for issuing the certificate. The name SHOULD be an officially registered name of the organization.

14 14 TS V1.1.1 ( ) A.2.5 Validity RFC 3280 [3] CAs conforming to this profile SHALL always encode certificate validity dates through the year 2049 as UTCTime; certificate validity dates in 2050 or later SHALL be encoded as GeneralizedTime. A.2.6 Subject RFC 3280 [3] When encoding attribute values of type DirectoryString, the encoding rules for the issuer field SHALL be implemented (RFC 3280 [3] section ). RFC 3739 [4] The countryname attribute value specifies a general context in which other attributes are to be understood. The country attribute does not necessarily indicate the subject's country of citizenship or country of residence, nor does it have to indicate the country of issuance. Many X.500 implementations require the presence of countryname in the DIT. In cases where the subject name, as specified in the subject field, specifies a public X.500 directory entry, the countryname attribute SHOULD always be present. It is the CA's responsibility to ensure that the serialnumber attribute is sufficient to resolve any subject name collisions. A.2.7 Subject public key info Requierement or recommendation RFC 3279 [7] The OID rsaencryption identifies RSA public keys. pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)rsadsi(113549) pkcs(1) 1 } rsaencryption OBJECT IDENTIFIER ::= { pkcs-1 1} A.3 X.509 version 2 certificate fields No specific requirement listed. A.4 Standard certificate extensions A.4.1 Authority key identifier RFC 3280 [3] The keyidentifier field of the authoritykeyidentifier extension SHALL be included in all end entity certificates. The value of the keyidentifier field SHOULD be derived from the public key used to verify the certificate's signature or a method that generates unique values. Two common methods for generating key identifiers from the public key are described in RFC 3280 [3] (section ). This extension SHALL NOT be marked critical. RFC 3280 [3] The value of the subject key identifier in the parent CA certificate SHALL be the value placed in the Authority Key Identifier extension of the end entity certificate.

15 15 TS V1.1.1 ( ) A.4.2 Subject key identifier RFC 3280 [3] Subject key identifiers SHOULD be derived from the public key or a method that generates unique values. RFC 3280 [3] This extension SHALL NOT be marked critical. To assist applications in identifying the appropriate end entity certificate, this extension SHOULD be included in all end entity certificates. For end entity certificates, subject key identifiers SHOULD be derived from the public key. Two common methods for generating key identifiers: 1) The keyidentifier is composed of the 160-bit SHA-1 hash of the value of the BIT STRING subjectpublickey (excluding the tag, length, and number of unused bits). 2) The keyidentifier is composed of a four bit type field with the value 0100 followed by the least significant 60 bits of the SHA-1 hash of the value of the BIT STRING subjectpublickey. A.4.3 KeyUsage RFC 3739 [4] The key usage extension SHALL be present. RFC 3280 [3] When this extension appears, it SHOULD be marked critical. RFC 3279 [7] If the keyusage extension is present in an end entity certificate which conveys an RSA public key, any combination of the following values MAY be present: - digitalsignature; - nonrepudiation; - keyencipherment; and - dataencipherment. A.4.4 Private key usage period RFC 3280 [3] This extension SHOULD NOT be used within the Internet PKI. CAs conforming to this profile SHALL NOT generate certificates that include a critical private key usage period extension. A.4.5 Certificate policies RFC 3280 [3] When a CA does not wish to limit the set of policies for certification paths which include this certificate, it MAY assert the special policy anypolicy, with a value of { }. RFC 3739 [4] The certificate policies extension SHALL contain the identifier of at least one certificate policy which reflects the practices and procedures undertaken by the CA. The certificate policy extension MAY be marked critical. A.4.6 Policy mappings RFC 3280 [3] The policy mappings extension SHALL NOT be present in end entity certificates.

16 16 TS V1.1.1 ( ) A.4.7 Subject alternative name RFC 3280 [3] Conforming implementations generating new certificates with electronic mail addresses SHALL use the rfc822name in the subject alternative name field (section ) to describe such identities. RFC 3280 [3] When the subjectaltname extension contains an Internet mail address, the address SHALL be included as an rfc822name. A.4.8 Issuer alternative name No specific requirements listed. A.4.9 Subject directory attributes RFC 3280 [3] This extension SHALL be non-critical. A.4.10 Basic constraints RFC 3280 [3] This extension MAY appear as a critical or non-critical extension in end entity certificates. A.4.11 Name constraints RFC 3280 [3] The name constraints extension SHALL NOT be present in end entity certificates. A.4.12 Policy constraints RFC 3280 [3] The policy constraints extension SHALL NOT be present in end entity certificates. A.4.13 Extended key usage No specific requirement listed. A.4.14 CRL distribution points No specific requirement listed.

17 17 TS V1.1.1 ( ) A.4.15 Inhibit any-policy RFC 3280 [3] The policy constraints extension SHALL NOT be present in end entity certificates. A.4.16 Freshest CRL RFC 3280 [3] This extension SHALL be non-critical. A.5 RFC 3280 internet certificate extensions A.5.1 Authority information access RFC 3280 [3] This extension SHALL be non-critical RFC 2560 [11] 3.1 CAs that support an OCSP service, either hosted locally or provided by an Authorized Responder, MUST provide for the inclusion of a value for a uniformresourceindicator (URI) accesslocation and the OID value id-ad-ocsp for the accessmethod in the AccessDescription SEQUENCE. A.5.2 Subject information access RFC 3280 [3] This extension SHALL be non-critical. A.6 RFC 3739 certificate extensions A.6.1 Biometric information RFC 3739 [4] This extension SHALL NOT be marked critical.

18 18 TS V1.1.1 ( ) A.6.2 Qualified certificate statement RFC 3739 [4] This extension MAY be critical or non-critical. If the extension is critical, this means that all statements included in the extension are regarded as critical. TS [5] The indication that a certificate is issued as a Qualified Certificate is provided according to the present document either: 1) when one of the certificate policies identified in the Certificate Policies extensions, as defined in clause from RFC 2459 [13], clearly express that the issuer intentionally has issued the certificate as a Qualified Certificate and that the issuer claims compliance with Annex I and Annex II of the Directive; or 2) when the Qualified Certificate Statements extension includes a statement, as defined in this clause.

19 19 TS V1.1.1 ( ) History V1.1.1 March 2004 Publication Document history

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)

More information

ETSI EN 319 412-2 V2.1.1 (2016-02)

ETSI EN 319 412-2 V2.1.1 (2016-02) EN 319 412-2 V2.1.1 (2016-02) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 2: Certificate profile for certificates issued to natural persons 2 EN 319 412-2

More information

ETSI SR 003 091 V1.1.2 (2013-03)

ETSI SR 003 091 V1.1.2 (2013-03) SR 003 091 V1.1.2 (2013-03) Special Report Electronic Signatures and Infrastructures (ESI); Recommendations on Governance and Audit Regime for CAB Forum Extended Validation and Baseline Certificates 2

More information

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security

More information

ETSI EN V1.1.1 ( )

ETSI EN V1.1.1 ( ) EN 319 412-5 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); Profiles for Trust Service Providers issuing certificates; Part 5: Extension for Qualified Certificate profile

More information

ETSI TS 102 778-3 V1.1.2 (2009-12) Technical Specification

ETSI TS 102 778-3 V1.1.2 (2009-12) Technical Specification TS 102 778-3 V1.1.2 (2009-12) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles

More information

ETSI TS 184 009 V2.0.0 (2008-06) Technical Specification

ETSI TS 184 009 V2.0.0 (2008-06) Technical Specification TS 184 009 V2.0.0 (2008-06) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Rules covering the use of TV URIs for the Identification

More information

ETSI TS 182 024 V3.0.0 (2015-10)

ETSI TS 182 024 V3.0.0 (2015-10) TS 182 024 V3.0.0 (2015-10) TECHNICAL SPECIFICATION Network Technologies (NTECH); Hosted Enterprise Services; Architecture, functional description and signalling 2 TS 182 024 V3.0.0 (2015-10) Reference

More information

ETSI TS V1.1.1 ( ) Technical Specification

ETSI TS V1.1.1 ( ) Technical Specification TS 102 778-6 V1.1.1 (2010-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 6: Visual Representations of Electronic Signatures

More information

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES

More information

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification TS 102 640-5 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.1 (2010-01)

More information

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification

ETSI TS 132 375 V7.0.0 (2007-06) Technical Specification TS 132 375 V7.0.0 (2007-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunication management; Security services

More information

ETSI TR 183 070 V3.1.1 (2009-08) Technical Report

ETSI TR 183 070 V3.1.1 (2009-08) Technical Report TR 183 070 V3.1.1 (2009-08) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control Sub-System (); Rr interface

More information

ETSI SR 003 232 V1.1.1 (2011-02) Special Report

ETSI SR 003 232 V1.1.1 (2011-02) Special Report SR 003 232 V1.1.1 (2011-02) Special Report Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles (PAdES); Printable Representations of Electronic Signatures 2 SR 003

More information

ETSI TR V1.2.1 ( )

ETSI TR V1.2.1 ( ) TR 102 047 V1.2.1 (2005-03) Technical Report International Harmonization of Electronic Signature Formats 2 TR 102 047 V1.2.1 (2005-03) Reference RTR/ESI-000028 Keywords e-commerce, electronic signature,

More information

ETSI TS 131 116 V6.7.0 (2005-03)

ETSI TS 131 116 V6.7.0 (2005-03) TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber

More information

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)

More information

ETSI TS 102 588 V7.1.0 (2007-07) Technical Specification

ETSI TS 102 588 V7.1.0 (2007-07) Technical Specification TS 102 588 V7.1.0 (2007-07) Technical Specification Smart Cards; Application invocation Application Programming Interface (API) by a UICC webserver for Java Card platform; (Release 7) 2 TS 102 588 V7.1.0

More information

ETSI TS 102 042 V1.1.1 (2002-04)

ETSI TS 102 042 V1.1.1 (2002-04) TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,

More information

ETSI TS 101 456 V1.4.3 (2007-05)

ETSI TS 101 456 V1.4.3 (2007-05) TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3

More information

ETSI TS 184 011 V3.1.1 (2011-02) Technical Specification

ETSI TS 184 011 V3.1.1 (2011-02) Technical Specification TS 184 011 V3.1.1 (2011-02) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Requirements and usage of E.164 numbers in NGN and

More information

ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification

ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem

More information

ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification

ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification TS 124 238 V8.2.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Session Initiation Protocol (SIP) based user configuration; Stage 3 (3GPP TS 24.238 version 8.2.0

More information

ETSI TR 103 123 V1.1.1 (2012-11)

ETSI TR 103 123 V1.1.1 (2012-11) TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile

Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile TS 103 174 V2.2.1 (2013-06) Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile 2 TS 103 174 V2.2.1 (2013-06) Reference RTS/ESI-0003174v221 Keywords ASiC, electronic

More information

ETSI TR 102 753 V1.1.1 (2008-05) Technical Report. Terrestrial Trunked Radio (TETRA); TETRA mobiles moving at high velocity

ETSI TR 102 753 V1.1.1 (2008-05) Technical Report. Terrestrial Trunked Radio (TETRA); TETRA mobiles moving at high velocity TR 102 753 V1.1.1 (2008-05) Technical Report Terrestrial Trunked Radio (TETRA); TETRA mobiles moving at high velocity 2 TR 102 753 V1.1.1 (2008-05) Reference DTR/TETRA-01188 Keywords MS, radio, TETRA 650

More information

ETSI GS NFV 003 V1.1.1 (2013-10)

ETSI GS NFV 003 V1.1.1 (2013-10) GS NFV 003 V1.1.1 (2013-10) Group Specification Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV Disclaimer This document has been produced and approved by the Network Functions

More information

TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications

TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications TR 103 279 V1.1.1 (2014-08) TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications 2 TR 103 279 V1.1.1 (2014-08) Reference DTR/E2NA-00006-Loc-Transcoders

More information

ETSI TS 102 640-3 V2.1.2 (2011-09)

ETSI TS 102 640-3 V2.1.2 (2011-09) TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

ETSI TS 101 329-2 V1.1.1 (2000-07)

ETSI TS 101 329-2 V1.1.1 (2000-07) TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition

More information

ETSI TR 101 303 V1.1.2 (2001-12)

ETSI TR 101 303 V1.1.2 (2001-12) TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network

More information

ETSI TR 102 678 V1.2.1 (2011-05) Technical Report

ETSI TR 102 678 V1.2.1 (2011-05) Technical Report TR 102 678 V1.2.1 (2011-05) Technical Report Speech and multimedia Transmission Quality (STQ); QoS Parameter Measurements based on fixed Data Transfer Times 2 TR 102 678 V1.2.1 (2011-05) Reference RTR/STQ-00184m

More information

ETSI ES 201 915-12 V1.3.1 (2002-10)

ETSI ES 201 915-12 V1.3.1 (2002-10) ES 201 915-12 V1.3.1 (2002-10) Standard Open Service Access (OSA); Application Programming Interface (API); Part 12: Charging SCF 2 ES 201 915-12 V1.3.1 (2002-10) Reference RES/SPAN-120094-12 Keywords

More information

ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification

ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture

More information

ETSI TS 102 639-5 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 639-5 V1.1.1 (2009-04) Technical Specification TS 102 639-5 V1.1.1 (2009-04) Technical Specification Access and Terminals, Transmission and Multiplexing (ATTM); Third Generation Transmission Systems for Interactive Cable Television Services - IP Cable

More information

ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification

ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core

More information

ETSI TS 119 403 V2.1.1 (2014-11)

ETSI TS 119 403 V2.1.1 (2014-11) TS 119 403 V2.1.1 (2014-11) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing

More information

ETSI TS 131 221 V9.0.0 (2010-02) Technical Specification

ETSI TS 131 221 V9.0.0 (2010-02) Technical Specification TS 131 221 V9.0.0 (2010-02) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Contact Manager Application Programming Interface (API); Contact Manager API for Java Card (3GPP

More information

ETSI TS 102 176-2 V1.2.1 (2005-07)

ETSI TS 102 176-2 V1.2.1 (2005-07) TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms

More information

ETSI TS 124 423 V8.4.0 (2012-01)

ETSI TS 124 423 V8.4.0 (2012-01) TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;

More information

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification

ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119

More information

ETSI EN 319 401 V1.1.1 (2013-01)

ETSI EN 319 401 V1.1.1 (2013-01) EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1

More information

ETSI EN 319 403 V2.2.2 (2015-08)

ETSI EN 319 403 V2.2.2 (2015-08) EN 319 403 V2.2.2 (2015-08) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust

More information

ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification TS 102 778-5 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 5: PAdES for XML Content - Profiles for XAdES signatures

More information

ETSI EN 300 328-2 V1.1.1 (2000-07)

ETSI EN 300 328-2 V1.1.1 (2000-07) EN 300 328-2 V1.1.1 (2000-07) Candidate Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; data transmission

More information

ETSI TS 101 735 V1.1.1 (2000-07)

ETSI TS 101 735 V1.1.1 (2000-07) TS 101 735 V1.1.1 (2000-07) Technical Specification Digital Audio Broadcasting (DAB); Internet Protocol (IP) datagram tunnelling European Broadcasting Union Union Européenne de Radio-Télévision EBU UER

More information

ETSI EN 301 002-1 V1.3.1 (2001-06)

ETSI EN 301 002-1 V1.3.1 (2001-06) EN 301 002-1 V1.3.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Security tools (SET) procedures; Digital Subscriber Signalling System No. one (DSS1)

More information

ETSI TS 101 903 V1.3.2 (2006-03)

ETSI TS 101 903 V1.3.2 (2006-03) TS 101 903 V1.3.2 (2006-03) Technical Specification XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.3.2 (2006-03) Reference RTS/ESI-000034 Keywords e-commerce, electronic signature, security

More information

ETSI TR 133 919 V6.1.0 (2004-12)

ETSI TR 133 919 V6.1.0 (2004-12) TR 133 919 V6.1.0 (2004-12) Technical Report Universal Mobile Telecommunications System (UMTS); Generic Authentication Architecture (GAA); System description (3GPP TR 33.919 version 6.1.0 Release 6) 1

More information

ETSI TS 102 042 V2.4.1 (2013-02)

ETSI TS 102 042 V2.4.1 (2013-02) TS 102 042 V2.4.1 (2013-02) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V2.4.1

More information

Final draft ETSI ES 202 913 V1.2.1 (2004-05)

Final draft ETSI ES 202 913 V1.2.1 (2004-05) Final draft ES 202 913 V1.2.1 (2004-05) Standard Access and Terminals (AT); POTS requirements applicable to ADSL modems when connected to an analogue presented PSTN line 2 Final draft ES 202 913 V1.2.1

More information

ETSI EN 300 356-7 V4.1.2 (2001-07)

ETSI EN 300 356-7 V4.1.2 (2001-07) EN 300 356-7 V4.1.2 (2001-07) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Signalling System No.7 (SS7); ISDN User Part (ISUP) version 4 for the international

More information

ETSI TS 124 088 V5.0.0 (2002-06)

ETSI TS 124 088 V5.0.0 (2002-06) TS 124 088 V5.0.0 (2002-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Call Barring (CB) Supplementary Service; Stage

More information

ETSI EN 301 489-5 V1.3.1 (2002-08)

ETSI EN 301 489-5 V1.3.1 (2002-08) EN 301 489-5 V1.3.1 (2002-08) Candidate Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard

More information

ETSI TR 102 458 V1.1.1 (2006-04)

ETSI TR 102 458 V1.1.1 (2006-04) TR 102 458 V1.1.1 (2006-04) Technical Report Electronic Signatures and Infrastructures (ESI); Mapping Comparison Matrix between the US Federal Bridge CA Certificate Policy and the European Qualified Certificate

More information

ETSI TS 101 903 V1.4.2 (2010-12) Technical Specification. Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)

ETSI TS 101 903 V1.4.2 (2010-12) Technical Specification. Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) TS 101 903 V1.4.2 (2010-12) Technical Specification Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.4.2 (2010-12) Reference RTS/ESI-000112 Keywords

More information

ETSI TR 101 643 V8.0.0 (2000-06)

ETSI TR 101 643 V8.0.0 (2000-06) TR 101 643 V8.0.0 (2000-06) Technical Report Digital cellular telecommunications system (Phase 2+); General network interworking scenarios (GSM 09.01 version 8.0.0 Release 1999) GLOBAL SYSTEM FOR MOBILE

More information

TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)

TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,

More information

DraftETSI EN 301 691 V1.1.1 (2000-03)

DraftETSI EN 301 691 V1.1.1 (2000-03) Draft EN 301 691 V1.1.1 (2000-03) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Remote Control (RC) service; Service description 2 Draft EN 301 691 V1.1.1 (2000-03)

More information

ETSI TS 102 164 V1.3.1 (2006-09)

ETSI TS 102 164 V1.3.1 (2006-09) TS 102 164 V1.3.1 (2006-09) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Emergency Location Protocols [OMA-TS-MLP-V3_2-20051124-C]

More information

Final draft ETSI EN 300 440-2 V1.3.1 (2008-11)

Final draft ETSI EN 300 440-2 V1.3.1 (2008-11) Final draft EN 300 440-2 V1.3.1 (2008-11) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Short range devices; Radio equipment to

More information

ETSI TS 102 124 V6.1.0 (2004-12)

ETSI TS 102 124 V6.1.0 (2004-12) TS 102 124 V6.1.0 (2004-12) Technical Specification Smart Cards; Transport rotocol for ICC based Applications; Stage 1 (Release 6) 2 TS 102 124 V6.1.0 (2004-12) Reference RTS/SC-R0008r1 Keywords protocol,

More information

ETSI TS 101 903 V1.1.1 (2002-02)

ETSI TS 101 903 V1.1.1 (2002-02) TS 101 903 V1.1.1 (2002-02) Technical Specification XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.1.1 (2002-02) Reference DTS/SEC-004008 Keywords electronic signature, security 650 Route des

More information

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act for Digital Signature Certificates issued under Information Technology Act Version 2.4 December 2009 Controller of Certifying Authorities Department of Information Technology Ministry of Communications

More information

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0 DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

More information

ETSI TS 102 723-10 V1.1.1 (2012-11)

ETSI TS 102 723-10 V1.1.1 (2012-11) TS 102 723-10 V1.1.1 (2012-11) Technical Specification Intelligent Transport Systems (ITS); OSI cross-layer topics; Part 10: Interface between access layer and networking & transport layer 2 TS 102 723-10

More information

EN 300 185-1 V1.2.4 (1998-06)

EN 300 185-1 V1.2.4 (1998-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Conference call, add-on (CONF) supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol;

More information

Draft ETSI EN 319 401 V1.1.1 (2012-03)

Draft ETSI EN 319 401 V1.1.1 (2012-03) Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN

More information

ETSI TS 131 220 V13.0.0 (2016

ETSI TS 131 220 V13.0.0 (2016 TS 131 220 V13.0.0 (2016 16-02) TECHNICAL SPECIFICATIONION Universal Mobile Telecommunications System (UMTS); LTE; Characteristics of the Contact Manager for 3GPP UICC applications (3GPP TS 31.220 version

More information

ETSI TR 101 480 V1.1.2 (1999-12)

ETSI TR 101 480 V1.1.2 (1999-12) TR 101 480 V1.1.2 (1999-12) Technical Report Integrated Services Digital Network (ISDN); Public Switched Telephone Network (PSTN); Framework for the provision of calling party name information 2 TR 101

More information

ETSI EN 300 440-2 V1.4.1 (2010-08) Harmonized European Standard (Telecommunications series)

ETSI EN 300 440-2 V1.4.1 (2010-08) Harmonized European Standard (Telecommunications series) EN 300 440-2 V1.4.1 (2010-08) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Short range devices; Radio equipment to be used in

More information

Draft SR 019 020 V0.0.4 (2013-11)

Draft SR 019 020 V0.0.4 (2013-11) SPECIAL REPORT Rationalised Framework of Standards for Advanced Electronic Signatures in Mobile Environment STABLE DRAFT FOR PUBLIC REVIEW UNTIL 15 JANUARY 2014 Download the template for comments: http://docbox.etsi.org/esi/open/latest_drafts/templatefor-comments.doc

More information

Draft EN 301 384 V1.1.1 (1998-10)

Draft EN 301 384 V1.1.1 (1998-10) European Standard (Telecommunications series) Telecommunications Management Network (TMN); Performance monitoring for PDH interfaces; Information model for the Network Element (NE) view 2 Reference DEN/TMN-00040

More information

Universal Mobile Telecommunications System (UMTS); Service aspects; Virtual Home Environment (VHE) (UMTS 22.70 version 3.0.0)

Universal Mobile Telecommunications System (UMTS); Service aspects; Virtual Home Environment (VHE) (UMTS 22.70 version 3.0.0) TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)120 Agenda Item: 9.8 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications

More information

Draft EN 301 068-1 V1.1.1 (1997-12)

Draft EN 301 068-1 V1.1.1 (1997-12) European Standard (Telecommunications series) Broadband Integrated Services Digital Network (B-ISDN); Digital Subscriber Signalling System No. two (DSS2) protocol; Connection characteristics; ATM transfer

More information

Draft EN 300 426 V1.2.1 (1998-10)

Draft EN 300 426 V1.2.1 (1998-10) European Standard (Telecommunications series) Private Integrated Services Network (PISN); Inter-exchange signalling protocol; Call intrusion supplementary service [ISO/IEC 14846 (1996), modified] 2 Reference

More information

ETSI TS 102 573 V1.1.1 (2007-07)

ETSI TS 102 573 V1.1.1 (2007-07) TS 102 573 V1.1.1 (2007-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for trust service providers signing and/or storing data for digital accounting 2

More information

Universal Mobile Telecommunications System (UMTS); Service aspects; Charging and Billing Approved at SMG#28 (UMTS 22.15 version 3.0.

Universal Mobile Telecommunications System (UMTS); Service aspects; Charging and Billing Approved at SMG#28 (UMTS 22.15 version 3.0. TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)116 Agenda Item: 9.4 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications

More information

ETSI ES 202 388-7 V1.1.1 (2005-03)

ETSI ES 202 388-7 V1.1.1 (2005-03) ES 202 388-7 V1.1.1 (2005-03) Standard Open Service Access (OSA); Application Programming Interface (API); Test Suite Structure and Test Purposes (TSS&TP); Part 7 Terminal Capabilities SCF (Parlay 4) 2

More information

ETSI TR 102 997 V1.1.1 (2010-04) Technical Report. CLOUD; Initial analysis of standardization requirements for Cloud services

ETSI TR 102 997 V1.1.1 (2010-04) Technical Report. CLOUD; Initial analysis of standardization requirements for Cloud services TR 102 997 V1.1.1 (2010-04) Technical Report CLOUD; Initial analysis of standardization requirements for Cloud services 2 TR 102 997 V1.1.1 (2010-04) Reference DTR/GRID-0009 StdRqmtsCloudSvc Keywords service,

More information

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems October 12, 2004 It is a frequently asked question if

More information

Certificate Path Validation

Certificate Path Validation Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security

More information

Draft EN 300 362 V1.2.1 (1998-10)

Draft EN 300 362 V1.2.1 (1998-10) European Standard (Telecommunications series) Private Integrated Services Network (PISN); Inter-exchange signalling protocol; Call offer supplementary service [ISO/IEC 14843 (1996), modified] 2 Reference

More information

ETSI TS V7.0.0 ( )

ETSI TS V7.0.0 ( ) TS 102 350 V7.0.0 (2005-09) Technical Specification Smart cards; Identity Files and Procedures on a UICC; Stage 1 (Release 7) 2 TS 102 350 V7.0.0 (2005-09) Reference DTS/SCP-R0287 Keywords ID, security,

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

Network Working Group. Category: Informational Internet Mail Consortium B. Ramsdell Worldtalk J. Weinstein Netscape March 1998

Network Working Group. Category: Informational Internet Mail Consortium B. Ramsdell Worldtalk J. Weinstein Netscape March 1998 Network Working Group Request for Comments: 2312 Category: Informational S. Dusse RSA Data Security P. Hoffman Internet Mail Consortium B. Ramsdell Worldtalk J. Weinstein Netscape March 1998 Status of

More information

Certificate Policy for. SSL Client & S/MIME Certificates

Certificate Policy for. SSL Client & S/MIME Certificates Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it

More information

ETSI TS 123 251 V6.5.0 (2005-09)

ETSI TS 123 251 V6.5.0 (2005-09) TS 123 251 V6.5.0 (2005-09) Technical Specification Universal Mobile Telecommunications System (UMTS); Network sharing; Architecture and functional description (3GPP TS 23.251 version 6.5.0 Release 6)

More information

Final draft ETSI EG 202 057-2 V1.1.1 (2002-07)

Final draft ETSI EG 202 057-2 V1.1.1 (2002-07) Final draft EG 202 057-2 V1.1.1 (2002-07) Guide Speech Processing, Transmission and Quality Aspects (STQ); User related QoS parameter definitions and measurements; Part 2: Voice telephony, Group 3 fax

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

ETSI TR 102 055 V1.1.1 (2005-05)

ETSI TR 102 055 V1.1.1 (2005-05) TR 102 055 V1.1.1 (2005-05) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); ENUM scenarios for user and infrastructure ENUM 2 TR 102

More information

ETSI EN 301 489-17 V2.1.1 (2009-05) Harmonized European Standard (Telecommunications series)

ETSI EN 301 489-17 V2.1.1 (2009-05) Harmonized European Standard (Telecommunications series) EN 301 489-17 V2.1.1 (2009-05) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for

More information

ETSI TR 102 041 V1.1.1 (2002-02)

ETSI TR 102 041 V1.1.1 (2002-02) TR 102 041 V1.1.1 (2002-02) Technical Report Signature Policies Report 2 TR 102 041 V1.1.1 (2002-02) Reference DTR/SEC-004022 Keywords electronic signature, security 650 Route des Lucioles F-06921 Sophia

More information

ETSI TS 101 107 V7.1.1 (1999-08)

ETSI TS 101 107 V7.1.1 (1999-08) TS 101 107 V7.1.1 (1999-08) Technical Specification Digital cellular telecommunications system (Phase 2+); Fraud Information Gathering System (FIGS); Service description - Stage 1 (GSM 02.31 version 7.1.1

More information

Polish Grid Certification Authority Certificate Policy and Certification Practice Statement

Polish Grid Certification Authority Certificate Policy and Certification Practice Statement Polish Grid Certification Authority Certificate Policy and Certification Practice Statement version 0.4 (DRAFT ) September 2, 2002 1 1 Introduction 1.1 Overview This document is written according to the

More information

Certificate Policy for OCES personal certificates (Public Certificates for Electronic Services)

Certificate Policy for OCES personal certificates (Public Certificates for Electronic Services) Certificate Policy for OCES personal certificates (Public Certificates for Electronic Services) - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8 3 Definitions

More information

Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors

Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors TR 101 533-2 V1.2.1 (2011-12) Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors 2 TR 101 533-2 V1.2.1 (2011-12) Reference

More information

ETSI ES 203 069 V1.2.1 (2011-09)

ETSI ES 203 069 V1.2.1 (2011-09) ES 203 069 V1.2.1 (2011-09) Standard Access, Terminals, Transmission and Multiplexing (ATTM); Remote management of CPE over broadband networks; CPE WAN Management Protocol (CWMP) 2 ES 203 069 V1.2.1 (2011-09)

More information